A hierarchical key management and authentication method for wireless sensor networks

Summary In wireless sensor networks, sensor nodes are typically distributed in harsh environments for continuous monitoring and data collection. All sensor nodes send the collected data directly or through other sensor nodes to the base station. Due to the nature and range of applications of these n...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of communication systems 2022-04, Vol.35 (6), p.n/a
Hauptverfasser: Alimoradi, Pourya, Barati, Ali, Barati, Hamid
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page n/a
container_issue 6
container_start_page
container_title International journal of communication systems
container_volume 35
creator Alimoradi, Pourya
Barati, Ali
Barati, Hamid
description Summary In wireless sensor networks, sensor nodes are typically distributed in harsh environments for continuous monitoring and data collection. All sensor nodes send the collected data directly or through other sensor nodes to the base station. Due to the nature and range of applications of these networks, maintaining security has always been one of the most critical challenges in wireless sensor networks. Key management is one of the methods used to maintain security in wireless sensor networks. In this paper, a hierarchical key management method for wireless sensor networks is presented. In the proposed method, first, the network is zoned, then the connection between the network nodes is established through two keys within the zone and between zones. The zone key is the shared key between the zone members and the zone manager. For intra‐zone communication, a lightweight authentication operation is performed between zone members and the zone manager. If the authentication operation is successful, the key generation process is performed within the zone. The inter‐zone key is shared between both of the manager nodes and is used for inter‐zone communication. The performance of the proposed method is compared with the Zhang et al. (2016); the EDAK (Athmani et al., 2019), DKMS (Yousefpoor & Barati, 2020), SSEKMS (Kumar et al., 2021), and ADPK (Ahlawat & Dave, 2021) methods show the proposed method's better performance. In this paper, a hierarchical key management method for wireless sensor networks is presented. In the proposed method, first, the network is zoned, then the connection between the network nodes is established through two keys within the zone and between zones. The zone key is the shared key between the zone members and the zone manager. For intra‐zone communication, a lightweight authentication operation is performed between zone members and the zone manager. If the authentication operation is successful, the key generation process is performed within the zone. The inter‐zone key is shared between both of the manager nodes and is used for inter‐zone communication.
doi_str_mv 10.1002/dac.5076
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2637880978</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2637880978</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2936-fcb7430bb2791fe47ceea66e6d1bc664cf37f156cef9c11397b24c9083438f143</originalsourceid><addsrcrecordid>eNp1kMFOwzAMhiMEEmMg8QiRuHDpSJo0aY7TYIA0ics4R2nq0G5tM5JO096ejHHl5N_yJ1v-ELqnZEYJyZ9qY2cFkeICTShRKqOU0ctTljwrWEGv0U2MG0JImYtigtZz3LQQTLBNa02Ht3DEvRnMF_QwjNgMNTb7sUk5jcfWD7iHsfE1dj7gQxuggxhxhCGmfoDx4MM23qIrZ7oId391ij6XL-vFW7b6eH1fzFeZzRUTmbOV5IxUVS4VdcClBTBCgKhpZYXg1jHpaCEsOGXTH0pWObeKlIyz0lHOpujhvHcX_Pce4qg3fh-GdFLngsmyJEqWiXo8Uzb4GAM4vQttb8JRU6JPznRypk_OEpqd0UPbwfFfTj_PF7_8D3AHbZ4</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2637880978</pqid></control><display><type>article</type><title>A hierarchical key management and authentication method for wireless sensor networks</title><source>Wiley-Blackwell Journals</source><creator>Alimoradi, Pourya ; Barati, Ali ; Barati, Hamid</creator><creatorcontrib>Alimoradi, Pourya ; Barati, Ali ; Barati, Hamid</creatorcontrib><description>Summary In wireless sensor networks, sensor nodes are typically distributed in harsh environments for continuous monitoring and data collection. All sensor nodes send the collected data directly or through other sensor nodes to the base station. Due to the nature and range of applications of these networks, maintaining security has always been one of the most critical challenges in wireless sensor networks. Key management is one of the methods used to maintain security in wireless sensor networks. In this paper, a hierarchical key management method for wireless sensor networks is presented. In the proposed method, first, the network is zoned, then the connection between the network nodes is established through two keys within the zone and between zones. The zone key is the shared key between the zone members and the zone manager. For intra‐zone communication, a lightweight authentication operation is performed between zone members and the zone manager. If the authentication operation is successful, the key generation process is performed within the zone. The inter‐zone key is shared between both of the manager nodes and is used for inter‐zone communication. The performance of the proposed method is compared with the Zhang et al. (2016); the EDAK (Athmani et al., 2019), DKMS (Yousefpoor &amp; Barati, 2020), SSEKMS (Kumar et al., 2021), and ADPK (Ahlawat &amp; Dave, 2021) methods show the proposed method's better performance. In this paper, a hierarchical key management method for wireless sensor networks is presented. In the proposed method, first, the network is zoned, then the connection between the network nodes is established through two keys within the zone and between zones. The zone key is the shared key between the zone members and the zone manager. For intra‐zone communication, a lightweight authentication operation is performed between zone members and the zone manager. If the authentication operation is successful, the key generation process is performed within the zone. The inter‐zone key is shared between both of the manager nodes and is used for inter‐zone communication.</description><identifier>ISSN: 1074-5351</identifier><identifier>EISSN: 1099-1131</identifier><identifier>DOI: 10.1002/dac.5076</identifier><language>eng</language><publisher>Chichester: Wiley Subscription Services, Inc</publisher><subject>authentication ; cryptography ; Data collection ; key management ; Nodes ; Radio equipment ; security ; Sensors ; Wireless networks ; wireless sensor network ; Wireless sensor networks</subject><ispartof>International journal of communication systems, 2022-04, Vol.35 (6), p.n/a</ispartof><rights>2021 John Wiley &amp; Sons Ltd.</rights><rights>2022 John Wiley &amp; Sons, Ltd.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2936-fcb7430bb2791fe47ceea66e6d1bc664cf37f156cef9c11397b24c9083438f143</citedby><cites>FETCH-LOGICAL-c2936-fcb7430bb2791fe47ceea66e6d1bc664cf37f156cef9c11397b24c9083438f143</cites><orcidid>0000-0003-0028-3568 ; 0000-0001-5132-5540</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1002%2Fdac.5076$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1002%2Fdac.5076$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,776,780,1411,27903,27904,45553,45554</link.rule.ids></links><search><creatorcontrib>Alimoradi, Pourya</creatorcontrib><creatorcontrib>Barati, Ali</creatorcontrib><creatorcontrib>Barati, Hamid</creatorcontrib><title>A hierarchical key management and authentication method for wireless sensor networks</title><title>International journal of communication systems</title><description>Summary In wireless sensor networks, sensor nodes are typically distributed in harsh environments for continuous monitoring and data collection. All sensor nodes send the collected data directly or through other sensor nodes to the base station. Due to the nature and range of applications of these networks, maintaining security has always been one of the most critical challenges in wireless sensor networks. Key management is one of the methods used to maintain security in wireless sensor networks. In this paper, a hierarchical key management method for wireless sensor networks is presented. In the proposed method, first, the network is zoned, then the connection between the network nodes is established through two keys within the zone and between zones. The zone key is the shared key between the zone members and the zone manager. For intra‐zone communication, a lightweight authentication operation is performed between zone members and the zone manager. If the authentication operation is successful, the key generation process is performed within the zone. The inter‐zone key is shared between both of the manager nodes and is used for inter‐zone communication. The performance of the proposed method is compared with the Zhang et al. (2016); the EDAK (Athmani et al., 2019), DKMS (Yousefpoor &amp; Barati, 2020), SSEKMS (Kumar et al., 2021), and ADPK (Ahlawat &amp; Dave, 2021) methods show the proposed method's better performance. In this paper, a hierarchical key management method for wireless sensor networks is presented. In the proposed method, first, the network is zoned, then the connection between the network nodes is established through two keys within the zone and between zones. The zone key is the shared key between the zone members and the zone manager. For intra‐zone communication, a lightweight authentication operation is performed between zone members and the zone manager. If the authentication operation is successful, the key generation process is performed within the zone. The inter‐zone key is shared between both of the manager nodes and is used for inter‐zone communication.</description><subject>authentication</subject><subject>cryptography</subject><subject>Data collection</subject><subject>key management</subject><subject>Nodes</subject><subject>Radio equipment</subject><subject>security</subject><subject>Sensors</subject><subject>Wireless networks</subject><subject>wireless sensor network</subject><subject>Wireless sensor networks</subject><issn>1074-5351</issn><issn>1099-1131</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNp1kMFOwzAMhiMEEmMg8QiRuHDpSJo0aY7TYIA0ics4R2nq0G5tM5JO096ejHHl5N_yJ1v-ELqnZEYJyZ9qY2cFkeICTShRKqOU0ctTljwrWEGv0U2MG0JImYtigtZz3LQQTLBNa02Ht3DEvRnMF_QwjNgMNTb7sUk5jcfWD7iHsfE1dj7gQxuggxhxhCGmfoDx4MM23qIrZ7oId391ij6XL-vFW7b6eH1fzFeZzRUTmbOV5IxUVS4VdcClBTBCgKhpZYXg1jHpaCEsOGXTH0pWObeKlIyz0lHOpujhvHcX_Pce4qg3fh-GdFLngsmyJEqWiXo8Uzb4GAM4vQttb8JRU6JPznRypk_OEpqd0UPbwfFfTj_PF7_8D3AHbZ4</recordid><startdate>202204</startdate><enddate>202204</enddate><creator>Alimoradi, Pourya</creator><creator>Barati, Ali</creator><creator>Barati, Hamid</creator><general>Wiley Subscription Services, Inc</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0003-0028-3568</orcidid><orcidid>https://orcid.org/0000-0001-5132-5540</orcidid></search><sort><creationdate>202204</creationdate><title>A hierarchical key management and authentication method for wireless sensor networks</title><author>Alimoradi, Pourya ; Barati, Ali ; Barati, Hamid</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2936-fcb7430bb2791fe47ceea66e6d1bc664cf37f156cef9c11397b24c9083438f143</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>authentication</topic><topic>cryptography</topic><topic>Data collection</topic><topic>key management</topic><topic>Nodes</topic><topic>Radio equipment</topic><topic>security</topic><topic>Sensors</topic><topic>Wireless networks</topic><topic>wireless sensor network</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Alimoradi, Pourya</creatorcontrib><creatorcontrib>Barati, Ali</creatorcontrib><creatorcontrib>Barati, Hamid</creatorcontrib><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>International journal of communication systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Alimoradi, Pourya</au><au>Barati, Ali</au><au>Barati, Hamid</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A hierarchical key management and authentication method for wireless sensor networks</atitle><jtitle>International journal of communication systems</jtitle><date>2022-04</date><risdate>2022</risdate><volume>35</volume><issue>6</issue><epage>n/a</epage><issn>1074-5351</issn><eissn>1099-1131</eissn><abstract>Summary In wireless sensor networks, sensor nodes are typically distributed in harsh environments for continuous monitoring and data collection. All sensor nodes send the collected data directly or through other sensor nodes to the base station. Due to the nature and range of applications of these networks, maintaining security has always been one of the most critical challenges in wireless sensor networks. Key management is one of the methods used to maintain security in wireless sensor networks. In this paper, a hierarchical key management method for wireless sensor networks is presented. In the proposed method, first, the network is zoned, then the connection between the network nodes is established through two keys within the zone and between zones. The zone key is the shared key between the zone members and the zone manager. For intra‐zone communication, a lightweight authentication operation is performed between zone members and the zone manager. If the authentication operation is successful, the key generation process is performed within the zone. The inter‐zone key is shared between both of the manager nodes and is used for inter‐zone communication. The performance of the proposed method is compared with the Zhang et al. (2016); the EDAK (Athmani et al., 2019), DKMS (Yousefpoor &amp; Barati, 2020), SSEKMS (Kumar et al., 2021), and ADPK (Ahlawat &amp; Dave, 2021) methods show the proposed method's better performance. In this paper, a hierarchical key management method for wireless sensor networks is presented. In the proposed method, first, the network is zoned, then the connection between the network nodes is established through two keys within the zone and between zones. The zone key is the shared key between the zone members and the zone manager. For intra‐zone communication, a lightweight authentication operation is performed between zone members and the zone manager. If the authentication operation is successful, the key generation process is performed within the zone. The inter‐zone key is shared between both of the manager nodes and is used for inter‐zone communication.</abstract><cop>Chichester</cop><pub>Wiley Subscription Services, Inc</pub><doi>10.1002/dac.5076</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0003-0028-3568</orcidid><orcidid>https://orcid.org/0000-0001-5132-5540</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1074-5351
ispartof International journal of communication systems, 2022-04, Vol.35 (6), p.n/a
issn 1074-5351
1099-1131
language eng
recordid cdi_proquest_journals_2637880978
source Wiley-Blackwell Journals
subjects authentication
cryptography
Data collection
key management
Nodes
Radio equipment
security
Sensors
Wireless networks
wireless sensor network
Wireless sensor networks
title A hierarchical key management and authentication method for wireless sensor networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T19%3A13%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20hierarchical%20key%20management%20and%20authentication%20method%20for%20wireless%20sensor%20networks&rft.jtitle=International%20journal%20of%20communication%20systems&rft.au=Alimoradi,%20Pourya&rft.date=2022-04&rft.volume=35&rft.issue=6&rft.epage=n/a&rft.issn=1074-5351&rft.eissn=1099-1131&rft_id=info:doi/10.1002/dac.5076&rft_dat=%3Cproquest_cross%3E2637880978%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2637880978&rft_id=info:pmid/&rfr_iscdi=true